Overview
Syllabus
Intro
What is a cloud service provider?
Shared responsibility model (IaaS)
Cloud service provider adoption aws
Infosec community on cloud services How well do traditional network Security tools work in cloud environments?
What are they after? It depends on the type of attacker
Attacks in the field
Enterprise architecture example
AWS architecture example
CSP Attacker Tools
Catching direct attacks against the CSP
Endpoint considerations
Endpoint visibility - forensics data
Endpoint visibility - PowerShell visibility
Executing code - Azure API | Endpoint execution
Executing code - AWS API | Endpoint execution
Taught by
NorthSec